Publications

Export 66 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
2007
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Comparison of fingerprint quality measures using an optical and a capacitive sensor», in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pagg 1-6.
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., e Roli, F., «Intrusion Detection Systems based on anomaly detection techniques», in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
2008
R. Tronci, Giacinto, G., e Roli, F., «Combination of experts by classifiers in similarity score spaces», in Joint IAPR Int. Workshop on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR08, Orlando (Florida, USA), 2008, vol 5342, pagg 821-830.
D. Ariu, Corona, I., Giacinto, G., e Roli, F., «McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications», in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Performance of fingerprint quality measures depending on sensor technology», Journal of Electronic Imaging, vol 17, 2008.
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
2010
D. Ariu e Giacinto, G., «HMMPayl: an application of HMM to the analysis of the HTTP Payload», in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, «Host and Network based Anomaly Detectors for HTTP Attacks», University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
2011
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
D. Ariu, Giacinto, G., e Roli, F., «Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security)», in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu e Giacinto, G., «A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers», in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
2012
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)
D. Ariu, Marcialis, G. L., Mauri, M., Muntoni, D., Ristori, M., e Roli, F., «Fatevi Riconoscere». 2012. (1.84 MB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
Z. Akhtar, «Security of Multimodal Biometric Systems against Spoof Attacks», University of Cagliari, Cagliari (Italy), 2012. (6.38 MB)

Pages